Chapter 1. Defining the Scope

   

Growing up you may have played the Milton Bradley game Stratego . The concept of the game is fairly simple: There are two players, each player has a flag, and the goal is to defend your flag while trying to capture the enemy's flag.

Stratego is a good analogy for network security. When designing a network security strategy your ultimate goal is to protect your corporate infrastructure, your flag, from attackers ”both internal and external.

This book is designed to help you develop your network security strategy. Because each company has a different approach to network security, it does not attempt to define a specific strategy for you. Instead, the book concentrates on ways to help you reach your ultimate goal in network security: protecting your network infrastructure.

This chapter defines the scope of network security, as covered in this book, discusses various types of network security, and outlines some of the costs associated with lax security policies.

In addition to the theoretical aspects of network security, it covers common network security mistakes, and describes a typical corporate network.

Pay close attention to the diagrams in the last section of this chapter. They will be referred to throughout the book, as potential security holes are plugged. The final chapter will present a redesigned and more secure network.

   


The Practice of Network Security. Deployment Strategies for Production Environments
The Practice of Network Security: Deployment Strategies for Production Environments
ISBN: 0130462233
EAN: 2147483647
Year: 2002
Pages: 131
Authors: Allan Liska

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net